A new Linux Botnet abuses IaC Tools to spread and other emerging techniques

Read the original article: A new Linux Botnet abuses IaC Tools to spread and other emerging techniques


A new Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques. Researchers from Trend Micro have spotted a new Linux botnet employing multiple emerging techniques among cyber-criminals, including the use of Tor proxies, the abuse of legitimate DevOps tools, and the removal or deactivation of competing […]

The post A new Linux Botnet abuses IaC Tools to spread and other emerging techniques